- M3AAWG Messaging playlist on YouTube
- Selected Training Videos (also available on www.youtube.com/maawg)
- Selected Keynote Videos (also available on www.youtube.com/maawg)
Below are the M3AAWG published materials related to our messaging anti-abuse work. There is also a Messaging video playlist on our YouTube channel at www.youtube.com/maawg and there are a few selected videos on our website in the Training Videos and Keynotes Videos sections under the Meetings menu tab.
Best Practices
M3AAWG DKIM Key Rotation Best Common Practices, March 2019
To minimize the risk of active DKIM keys being compromised, they should be changed frequently. This document was updated in March 2019 and discusses why keys should be rotated, how frequently they should be rotated, and suggests the best common practices for doing so.
M3AAWG Border Gateway Protocol (BGP) Flowspec Best Practices
Flow Specification (Flowspec) is a new type of Network Layer Reachability Information (NLRI) for the BGP routing protocol. It was originally developed to help mitigate DDoS attacks but its use has expanded to numerous other applications.
M3AAWG Position on Email Appending, Version 1.0.1
In marketing terms, “appending” – also known as "e-appending" or "e-pending" – is the practice of taking demographic information known (or assumed) to be related to a particular customer and matching it with other data. It is the position of M3AAWG that this is an abusive messaging practice. The January 2019 Version 1.0.1 is updated to include the European Union's GDPR and CASL.
M3AAWG Best Current Practices for Reporting Phishing URLs
Phishing continues to be a significant problem for hosting companies, mailbox providers, brand owners and, of course, for every internet user. This document iinforms all of these groups on the best current practices for reporting phishing URLs.
A M3AAWG Introduction to Addressing Malicious Domain Registrations
This document focuses on defining malicious domain names and provides a non-exhaustive list of possible actions that can be taken to address them.
Pages
Public Policy Comments
M3AAWG Comments to FTC on CAN SPAM 2017
M3AAWG submitted these comments in response to the U.S. Federal Trade Commission's request for comments on 16 CFR Part 316 of the CAN-SPAM Rule. The comments can be viewed on the FTC site at https://www.ftc.gov/policy/public-comments/2017/08/30/comment-87
M3AAWG Comments on Restoring Internet Freedom
M3AAWG responded to the Federal Communications Commission's May 2017 Notice of Proposed Rulemaking (“NPRM”) relating to net neturality that was titled Restoring Internet Freedom. Our comments can also be found on the FCC site at https://www.fcc.gov/ecfs/filing/1082812398671.
M3AAWG Comments on Restoring Internet Freedom
M3AAWG responded to the Federal Communications Commission's May 2017 Notice of Proposed Rulemaking (“NPRM”) relating to net neturality that was titled Restoring Internet Freedom. Our comments can also be found on the FCC site at https://www.fcc.gov/ecfs/filing/1082812398671.
Using Generic Top Level Domain Registration Information (WHOIS Data) in Anti-Abuse Operations
WHOIS information plays a key role in determining where to report instances of abuse involving domain names. This paper explains some of the important WHOIS elements used to fight spam, phishing, malware distribution and other threats.
M3AAWG Comments on U.S. FCC Protecting the Privacy of Customers of Broadband and Other Telecommunications Services
Submitted on May 27, 2016 responding to a U.S. Federal Communications Communications Notice of Proposed Rulemaking from the Wireline Competition Bureau. All comments and the FCC proposal are available at http://apps.fcc.gov/ecfs/proceeding/view/view?name=16-106.
Note: The FCC released its Rules to Protect Broadband Consumer Privacy on October 26, 2016, quoting several comments from M3AAWG.
Pages
M3AAWG Reports
DM3Z Blog
Updates and Commentary from the Messaging, Malware and Mobile Anti-Abuse Working Group
None at this time.
News
News Releases
M3AAWG Commends U.S. Homeland Security for Adopting Online Anti-Abuse Technologies to Protect Users; DHS Chief Cybersecurity Official Keynotes M3AAWG Meeting
M3AAWG Recommends Adding New Email Header to Mitigate List Bomb Attacks from Subscription Sign-Up Forms
German Law Enforcement Officials Receive 2017 M3AAWG J.D. Falk Award for Initiating Global Takedown of Avalanche Malware Platform
Pages
Articles About M3AAWG
Solving extreme email deliverability mysteries
https://postmarkapp.com/podcast/solving-extreme-email-deliverability-mysteries
Anna Ward, Postmark’s head of deliverability, discusses her path to becoming an email deliverability expert and the impact of being a part of the M3AAWG community on her work.
Policy eliminates pre-emptive protection of internet infrastructure abuse
Networks Asia - Security Asia
https://www.networksasia.net/article/policy-eliminates-pre-emptive-prote...
A joint APWG-M3AAWG survey of cybercrime responders and anti-abuse personnel indicates ICANN’s Temporary Specification for domain name WHOIS data has eliminated interventions that previously allowed investigators to stop new cybercrimes while still in the preparatory stages -- and has markedly impeded routine mitigations for many kinds of cybercrimes.
How Do You Fight a $12B Fraud Problem? One Scammer at a Time
https://krebsonsecurity.com/2018/10/how-do-you-fight-a-12b-fraud-problem...
Brian Krebs interviewed Ronnie Tokazowski, founder of the private BEC List that received the 2018 JD Falk Award, on Business Email Compromise and the list's cooperative fight to protect end-users.
Group recognized for efforts thwart Nigerian email scams
https://thehill.com/policy/cybersecurity/410603-private-group-recognized...
Coverage of the BEC List fighting online fraud and the M3AAWG 2018 JD Falk Award it received.
The History of Email with Dave Crocker, Part 2
https://thenetworkcollective.com/2018/06/hon-email-part-2/
In 1990, an unresolvable debate over how to expand email beyond ASCII text spawned two separate working groups and is a rare example of how staunchly competitive tech groups unintentionally ended up collaborating to create something important that went beyond the original objective. The result: multimedia email, according to M3AAWG Senior Technical Advisor Dave Crocker in part 2 of his Network Collective podcast on the history of email.
Pages
Videos
